In around 300 words describe how bibliofind might have used

Assignment Help Computer Engineering
Reference no: EM13469688

Bibliofind was one of the first Web sites to specialize in hard-to-find and collectible books. The site featured a powerful search engine for used and rare books. The search engine's database was populated with the results of Bibliofind's daily surveys of a worldwide network of suppliers. Registered site visitors could specify the title for which they were searching, a price range, and whether they were seeking a first edition. The site also allowed visitors to build a wish list that would trigger an e-mail when a specific book on the list became available.

Bibliofind had developed a large customer list, an excellent reputation, and a solid network of rare book dealers, all of which made the company an attractive acquisition for other online bookstores. In 1999, Amazon.com bought Bibliofind, but Bibliofind continued to operate its own Web site and conduct its business as it had before the acquisition.

Several years after the Amazon.com acquisition, Bibliofind's Web site was hacked. The cracker had gained access to the company's Web server and replaced the company's Web pages with defaced versions. Bibliofind shut down its Web site for several days and undertook a complete review of its Web site's security. When the company's IT staff examined the server logs carefully, they found that the Web page hacking was only the tip of the iceberg. Entries in the logs showed that attackers had been accessing Bibliofind's computers for more than four months. Even worse, some of the crackers had been able to go through the Web servers to gain access to the computers that held Bibliofind customer information, including names, addresses, and credit card numbers. That information had been stored in plain text files on Bibliofind's transaction servers.

Bibliofind called in state and federal law enforcement officials to investigate the hacking incidents and sent an e-mail notification to the 98,000 customers whose private information might have been obtained by the crackers. The investigation did not result in any arrests, nor did it determine the identity of the intruders. Many of Bibliofind's customers were very upset when they learned what had happened.

A month after the hacking incident, Amazon.com moved Bibliofind into its zShops online mall (zShops was the original name of Amazon Marketplace). As an Amazon zShop, Bibliofind could process its transactions through Amazon's system and no longer needed to maintain private information about its customers on its computers; however, the company had seen its reputation seriously damaged and eventually was closed down. A successful business was ended in large part because had it failed to maintain adequate security over the customer information it had gathered.

Required:

1. In about 300 words, explain how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers. Be specific about where the firewalls should have been placed in the network and what kinds of rules they should have used to filter network traffic at each point.

2. California has a law that requires companies to inform customers whose private information might have been exposed during a security breach like the one that Bibliofind experienced. Before California enacted this law, businesses argued that the law would encourage nuisance lawsuits. In about 300 words, present arguments for and against this type of legislation.

Reference no: EM13469688

Questions Cloud

If 200 of adults surveyed were in the age category of 24 : based on a survey of 1000 adults by greenfield online and reported in a may 2009 usa today snapshot adults 24 years of
Write a report on a special probationparole client and : write a report on a special probationparole client and programs that have been established to address this problem
When 150 g of steam drops in temperature from 2750 degc to : when 15.0 g of steam drops in temperature from 275.0 degc to 250.0 degc how much heat energy is released? cp of h2o
Sync computers inc makes computer-related products under : sync computers inc. makes computer-related products under the brand name sync which the company registers as a
In around 300 words describe how bibliofind might have used : bibliofind was one of the first web sites to specialize in hard-to-find and collectible books. the site featured a
Yun tung chow tried to unclog a floor drain in the kitchen : yun tung chow tried to unclog a floor drain in the kitchen of the restaurant where he worked. he used a drain cleaner
Many scholars politicians and everyday people have : many scholars politicians and everyday people have disputed the value of criminal laws sentencing laws and
Compute concentration of hydrochloric acid find the ph at : during an acid-base titration 23.3 ml of hcl completely neutralized 19.5 ml of potassium hydroxide 0.315 m. calculate
In 2004 and 2005 kent avery on behalf of his law firm-the : in 2004 and 2005 kent avery on behalf of his law firm-the law office of kent avery llc-con-tracted with marlin

Reviews

Write a Review

Computer Engineering Questions & Answers

  How has the system installed by dtis helped integrate

how did the dtis crm team change the business process for dealing with abandoned vehicles in san francisco? how did

  What does the name ajax stand for

What does the name Ajax stand for? What is Ajax, and what does it do? Give an example of how Netflix® uses Ajax, and define why this makes the Web site faster.

  Determining the spped of a computer

determining the spped of a computer

  Show the resulting binary search tree that is created

Based on the 2-3-4 tree you created, flag the same 4 numbers in the previous problem for deletion. Then, traverse the 2-3-4 tree in order to get the remaining numbers (i.e. identify in order, the numbers that are not marked for deletion).

  Find out and display the total owed for all taxpayers

A taxpayer's federal tax due is calculated as follow. First, the taxpayer gets a dependency exemption deduction of $2,000 for each child. So, if a taxpayer has two children, he or she would get a dependency exemption deduction of $4,000. A taxpaye..

  Create program to read the lengths of the two legs

Write down a program to read the lengths of the two legs of a right triangle and to calculate and display the area of the triangle (one-half the product of the legs) and the length of the hypotenuse (square root of the sum of the square of the leg..

  How would you assess quality of a computer program

we have developed quality factors that we look for in a software product to measure quality. These are usually done at the macroscopic level, but how would you assess quality of a computer program if you received an e-mail with a source listing of..

  Implementing the nested – loop join algorithm

Implement the Nested – Loop Join algorithm in any of the programming language.The solution should involve:a) Source file of application,

  Identify the class boulesurprise

Identify the class BouleSurprise.

  Security issues while users processing the database

Describe the security issues which may be encountered when the multiple users process the database concurrently.

  Illustrate precedence graph

Illustrate precedence graph

  Interviewing for chief information officer

XYZ is interviewing candidates for position of Chief Information Officer (CIO). They are inquiring the candidates to explain briefly how they could satisfy their requirements as described above. State how would a successful candidate respond to th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd